Dropped Files | ZeroBOX
Name d6671b13994d3342_~$19_7169909343268.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$19_7169909343268.doc
Size 162.0B
Processes 1960 (WINWORD.EXE)
Type data
MD5 a8315f7cf07fe0e72c8ab5f2aa42f3e8
SHA1 65354ccaab08106ef8fd216e8f8dc06fa8876e3f
SHA256 d6671b13994d33426b7806ce91af2f5f84d05d126ddc0edc97e3ebad27e4c2cb
CRC32 8FFEFE3F
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt4snWl2tjgWIart/:y1lWnlxK7ghq4sROWIet
Yara None matched
VirusTotal Search for analysis
Name a1fa622b47a529e1_fe4bd9a3.emf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FE4BD9A3.emf
Size 4.9KB
Processes 1960 (WINWORD.EXE)
Type Windows Enhanced Metafile (EMF) image data version 0x10000
MD5 bf2393dfe4576945d1f26d3595c5ef9f
SHA1 f9abbbcf4bad106e4f5c039082257357f4c28aef
SHA256 a1fa622b47a529e1064458aa0decd0c1ebc16efb621511c8cba545036ffeb00e
CRC32 71C49B27
ssdeep 24:Y6cOaHN87k0sqFjsdB3g6G7OdE5qOppcWfswKnZFwG6uvX51m0KZdHk1a/Uo:XQNikssdBg6qjpLkwOEG6kpnydHk1a/Z
Yara None matched
VirusTotal Search for analysis
Name cc6214d67b6c9c45_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1960 (WINWORD.EXE)
Type data
MD5 57c528817382a3538ec35dd5cf4be558
SHA1 5d8a2dd5b3b1ffa58c0f40b541058090be2d3caa
SHA256 cc6214d67b6c9c45c54102a97e49bb4c067e3fea454996ec098795d59c825f02
CRC32 CC573495
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItO/OtjgWIart/:y1lWnlxK7ghqO2OWIet
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{d0f010b3-d030-4d18-a5d8-283d9f846984}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D0F010B3-D030-4D18-A5D8-283D9F846984}.tmp
Size 1.0KB
Processes 1960 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis